A global internet puzzle that requires advanced computer skills to solve has reopened online.
It is the third year running that the mysterious Cicada 3301 has appeared, with no clues as to who is behind the puzzle.
Some believe it is a recruitment process for a government spy agency, while others believe it could be the work of a bank.
The puzzle takes people on a treasure trail around the so-called dark net.
This year’s competition was announced via a Twitter account to which was attached an image file with the following message: “Hello. Epiphany is upon you. Your pilgrimage has begun. Enlightenment awaits. Good luck. 3301.”
Thousands of fans have been drawn into the competition and have eagerly awaited its relaunch.
This year’s iteration already appears to be fiendishly difficult, requiring understanding of OutGuess, a complex steganography tool.
Steganography hides data inside images, and is often used for nefarious purposes by terrorists and paedophiles.Anglo-Saxon runes
Computer scientist Prof Alan Woodward is one of those who has previously taken part in the competition.
“The puzzles are very complicated and require knowledge of steganography, cryptography as well as obscure existential texts,” he told the BBC.
Previous competitions have taken people on both a mental and physical journey, encompassing cyber-punk literature, Anglo-Saxon runes and the work of occultist and magician Aleister Crowley.
Last year, part of the treasure trail also required people to travel to physical locations to decode QR codes posted on telegraph poles dotted around the US.
Now that the competition is widely known about there has been a spate of fakes but for those with the necessary knowledge it is easy to spot the real thing.
“The group uses a PGP signature and put up a key signed with this,” explained Prof Woodward.
Speculation about who is behind the puzzle has been gaining momentum as the competition attracts more publicity.
“It could be a criminal organisation looking for recruits or it could be a start-up looking to set up a new crypto-currency, possibly even a bank,” said Prof Woodward.
“Lots of people think it could be a government agency and that looks reasonably likely as whoever is being recruited isn’t telling anybody afterwards,” he added.
The Latest on: Steganography
via Google News
The Latest on: Steganography
- e-Commerce Site Hackers Now Hiding Credit Card Stealer Inside Image Metadataon June 29, 2020 at 3:33 am
In what's one of the most innovative hacking campaigns, cybercrime gangs are now hiding malicious code implants in the metadata of image files to covertly steal payment card information entered by ...
- Revamped IcedID Banking Trojan Campaign Uses COVID-19 Lureon June 23, 2020 at 11:26 am
Fraudsters are now deploying the IcedID banking Trojan via phishing campaigns that use the COVID-19 pandemic as one of several lures, according to Juniper Threat ...
- Shakespeare In A Zip In A RAR, Hidden In An Image On Twitteron June 20, 2020 at 5:00 pm
Steganography involves hiding data in something else — for example, encoding data in a picture. [David Buchanan] used polyglot files not to hide data, but to send a large amount of data in a ...
- Cheating AI Caught Hiding Data Using Steganographyon June 16, 2020 at 5:00 pm
AI today is like a super fast kid going through school whose teachers need to be smarter than if not as quick. In an astonishing turn of events, a (satelite)image-to-(map)image conversion ...
- Kaspersky Reveals New Details Into Series of Targeted Attacks on Industrial Companieson June 3, 2020 at 3:50 am
For instance, the malware module is encoded inside the image using steganography methods, and the image itself is hosted on legitimate web resources. All this makes it almost impossible to detect ...
- Kaspersky reveals new details into series of targeted attacks on industrial companieson June 2, 2020 at 5:00 pm
Research has shown that attackers used malicious Microsoft Office documents, PowerShell scripts, and various techniques to make it difficult to detect and analyze their malware - including ...
- Multilingual malware attacks on industrial sector suppliers designed to thwart detectionon June 1, 2020 at 3:28 pm
Utilizing steganography to conceal malicious data within another file, while abusing legitimate web resources to host the malware, the attackers made it highly difficult to detect infection ...
- An advanced and unconventional hack is targeting industrial firmson May 30, 2020 at 9:22 am
The PowerShell script reaches out to either imgur.com or imgbox.com and downloads an image that has malicious code hidden inside the pixels through a technique called steganography. The data is ...
via Bing News